Browsing the "deserialization" Tag

Concrete5 8.5.5 Phar Deserialization – Torchsec

July 20th, 2021 | ๐Ÿ•’

https://www.ispeech.org/text.to.speech ------------------------------------------------------------------------Concrete5 < = 8.5.5 (Logging Settings) Phar Deserialization Vulnerability------------------------------------------------------------------------ -] Software Link: https://www.concrete5.org -] Affected Versions: Version 8.5.5 and


ForgeRock / OpenAM Jato Java Deserialization – Torchsec

July 13th, 2021 | ๐Ÿ•’

iSpeech ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRankingprepend Msf::Exploit::Remote::AutoCheckinclude Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::CmdStager def initialize(info


QRadar RemoteJavaScript Deserialization โ‰ˆ Packet Storm

October 20th, 2020 | ๐Ÿ•’

iSpeech ------------------------------------------------------------------------Java deserialization vulnerability in QRadar RemoteJavaScript Servlet------------------------------------------------------------------------Abstract------------------------------------------------------------------------A Java deserialization vulnerability exists in the QRadarRemoteJavaScript Servlet. An authenticated user can


Hyland OnBase Insecure Deserialization โ‰ˆ Packet Storm

September 8th, 2020 | ๐Ÿ•’

Text to Speech Voices CVSSv3.1 Score-------------------------------------------------AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Vendor-------------------------------------------------Hyland Software - (https://www.hyland.com/en/ and https://www.onbase.com/en/) Product-------------------------------------------------Hyland OnBaseAll derivatives based on OnBase Versions Affected-------------------------------------------------All


Apache OFBiz XML-RPC Java Deserialization โ‰ˆ Packet Storm

August 18th, 2020 | ๐Ÿ•’

iSpeech ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking prepend Msf::Exploit::Remote::AutoCheckinclude Msf::Exploit::Remote::HttpClientinclude